
CVE-2009-5155 – Ubuntu Security Notice USN-4954-1
https://notcve.org/view.php?id=CVE-2009-5155
26 Feb 2019 — In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match. En la biblioteca GNU C (también conocida como glibc o libc6), en versiones anteriores a la 2.28, parse_reg_exp en posix/regcomp.c analiza erróneamente las alternativas, lo que permite que los atacantes provoquen una denegación de serv... • http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 • CWE-19: Data Processing Errors •

CVE-2019-7309 – Gentoo Linux Security Advisory 202006-04
https://notcve.org/view.php?id=CVE-2019-7309
03 Feb 2019 — In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled. En GNU C Library (también conocido como glibc o libc6), hasta la versión 2.29, la función memcmp para la arquitectura x32 puede devolver cero (indicando que las entradas son iguales) de manera incorrecta debido a que el bit de RDX más significativo se gestiona incorrectamente. Multiple vulne... • http://www.securityfocus.com/bid/106835 •

CVE-2016-10739 – glibc: getaddrinfo should reject IP addresses with trailing characters
https://notcve.org/view.php?id=CVE-2016-10739
21 Jan 2019 — In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings. En la biblioteca GNU C Library (también conocida como glibc o libc6) hasta la versión 2.28, la función getaddrinfo analiza exitosamente un... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html • CWE-20: Improper Input Validation •

CVE-2019-6488 – Gentoo Linux Security Advisory 202006-04
https://notcve.org/view.php?id=CVE-2019-6488
18 Jan 2019 — The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy. El componente string en GNU C Library (también conocido como glibc o libc6) hasta la versión 2.28, cuando se ej... • http://www.securityfocus.com/bid/106671 • CWE-404: Improper Resource Shutdown or Release •

CVE-2018-19591 – Gentoo Linux Security Advisory 201908-06
https://notcve.org/view.php?id=CVE-2018-19591
04 Dec 2018 — In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function. En la biblioteca GNU C (también conocida como glibc o libc6) hasta la versión 2.28, los intentos para resolver un nombre de host manipulado mediante getaddrinfo() conducen a la asignación de un descriptor de un socket que no está cerrado. Esto está relacionado con la función if_n... • http://www.securityfocus.com/bid/106037 • CWE-20: Improper Input Validation •

CVE-2018-11236 – glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow
https://notcve.org/view.php?id=CVE-2018-11236
18 May 2018 — stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution. stdlib/canonicalize.c en GNU C Library (también conocida como glibc o libc6), en versiones 2.27 y anteriores, al procesar argumentos con un nombre de ruta muy largo en la función realpath, podría encontrarse con u... • http://www.securityfocus.com/bid/104255 • CWE-121: Stack-based Buffer Overflow CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2018-11237 – glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper
https://notcve.org/view.php?id=CVE-2018-11237
18 May 2018 — An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper. Una implementación optimizada para AVX-512 de la función mempcpy en GNU C Library (también conocido como glibc o libc6), en versiones 2.27 y anteriores, podría escribir datos más allá del búfer objetivo, lo que desemboca en un desbordamiento de búfer en __mempcpy_avx512_no_vzeroupper. A ... • https://packetstorm.news/files/id/147870 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2017-18269 – Ubuntu Security Notice USN-4416-1
https://notcve.org/view.php?id=CVE-2017-18269
18 May 2018 — An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution. Una implementación memmove optimiza... • https://github.com/fingolfin/memmove-bug • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-17426 – Ubuntu Security Notice USN-3534-1
https://notcve.org/view.php?id=CVE-2017-17426
05 Dec 2017 — The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check. La función malloc en GNU C Library (también conocida como glibc o libc6) 2.26 podría devolver un bloque de memoria demasiado pequeño si se intenta asig... • https://sourceware.org/bugzilla/show_bug.cgi?id=22375 • CWE-190: Integer Overflow or Wraparound •

CVE-2011-5320
https://notcve.org/view.php?id=CVE-2011-5320
18 Oct 2017 — scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s. La función scanf y las funciones relacionadas en glibc en versiones anteriores a la 2.15 permiten que usuarios locales provoquen una denegación de servicio (fallo de segmentación) mediante una larga cadena de ceros. • http://www.openwall.com/lists/oss-security/2015/03/12/14 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •